CONTACT US
info@bidaiondo.com
The use of new technologies and digital media to materialize new experiences in digital transformation generate greater participation and commitment of users, although they simultaneously increase the dangers of digital fraud and information violation. This is revealed by an investigation carried out by the consulting firm Baufest, which verifies how innovative retail business models put firms at increasing risk for their operation.
Digital transformation in the retail sector
With the arrival and consolidation of the digital transformation in the retail sector, it is intended to respond to the divergences in terms of consumer needs and expectations. However, the immediacy of the changes are above security controls, since the wholesale chains, by generating an expansion in their digital infrastructures that improve their user experience, are at the same time falling into a possible attack.
Generally, it is a happening event in industries, although a number of essential challenges imply that there are cybersecurity risks in retail, leading to a more alarming scenario.
From the foregoing, the following can be deduced: each sector, computer, tablet, mobile device or Wi-Fi, can be tools that make the work of digital transformation teams more complex, so computer security in firms seeks to solvents each of the attack channels. Although transactions are usually executed through digital channels, storing data in cloud environments, all retailers are exposed to cyberattacks.
Companies are obliged to establish cybersecurity strategies or policies, for which it is key to give support to correct practices among workers; Likewise, have surveillance processes that may be essential to care for and eradicate the threats that cybercrime can create. On the other hand, the so-called data lakes of retail companies are usually attractive spaces, since they are traditionally providing super-confidential identity data, such as information regarding credit cards.
Considering some statistics from Interface, 84% of the cyberattacks that are executed in the industry have social engineering, system intrusion and attacks on basic apps. On the other hand, 87% of the experienced cases are usually external and 13% tend to be internal. When it comes to compromised information, 45% is made up of credentials, 27% to personal data, 25% to payment information, and 25% to other sources.
It's been a busy few days (very busy, in fact) at OpenAI, which seems to have finally responded to the "code red" activated by its CEO, Sam Altman, at the end of last year. In the same week that we saw the launch of Images 2.0 and Workspace Agents, a new version of GPT, 5.5, has arrived. 5 key points about the new GPT 5.5 1. Solving complex problems Specifically, the company seems very proud of this new model's ability...
At its Cloud Next event, Google announced the arrival of AI Overviews to Gmail. This feature, based on Gemini 3 technology, will allow Google's email platform to generate AI-powered summaries from your emails. Currently, this feature is only available in English in the United States and can be used on personal accounts with the Google AI Pro and Google AI Ultra plans, as well as on professional or educational accounts with a Google Workspa...

BIDAIONDO SL, as the party responsible for the website www.bidaiondo.com, uses its own operating cookies and those of third parties of an analytical nature to allow the use of the website, analyze our services and show you information related to your preferences based on a profile drawn up from of your browsing habits (for example: pages visited). Please bear in mind that, if you do not activate some types of cookies, such as operational and analytical cookies, your experience of using this website may be affected. You can obtain more information and configure your preferences in the CONFIGURE option that appears below, you can reject cookies in the REJECT AND CLOSE option or accept all cookies and continue browsing in the ACCEPT AND CLOSE option.
Data privacy seems important to you, and it is to us too. We store cookie data for 13 months. If you want to know more, you can visit our pages Privacy Policy y Cookies policy. Do you know what cookies are? Cookies are files that are used by virtually all websites. When browsing our page, they are installed in your browser or device to ensure that the website works correctly and store information about your visit. The data provided by cookies treat the user anonymously and in no case do they store personal information.
The data collected by the cookies we use are:
- Addresses IP
- References of visited pages
- References of downloaded files